CN106373082A - Cellular automata and chaotic mapping-based digital image encryption method and decryption method thereof - Google Patents

Cellular automata and chaotic mapping-based digital image encryption method and decryption method thereof Download PDF

Info

Publication number
CN106373082A
CN106373082A CN201610848141.8A CN201610848141A CN106373082A CN 106373082 A CN106373082 A CN 106373082A CN 201610848141 A CN201610848141 A CN 201610848141A CN 106373082 A CN106373082 A CN 106373082A
Authority
CN
China
Prior art keywords
chaotic mapping
image
chaotic
iteration
cellular automata
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610848141.8A
Other languages
Chinese (zh)
Inventor
单汇丰
陈炬桦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sun Yat Sen University
Original Assignee
Sun Yat Sen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sun Yat Sen University filed Critical Sun Yat Sen University
Priority to CN201610848141.8A priority Critical patent/CN106373082A/en
Publication of CN106373082A publication Critical patent/CN106373082A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Image Processing (AREA)

Abstract

The invention provides a cellular automata and chaotic mapping-based digital image encryption method and a decryption method thereof. The encryption method includes the following steps that: a 288-bit key is utilized to generate chaotic mapping parameters and cellular automaton evolution rules which are required by an encryption algorithm; pre-processing such as three-dimensional decomposition and blocking, is carried out on an original image; 3D chaotic mapping is adopted to scramble pixel positions; cross-exclusive-OR operation is performed on image blocks to be encrypted; and a 2D second-order cellular automata used for generating boundaries, which is provided by the present invention, is utilized to carry out iterative encryption on an unfolded plaintext, pixels are mixed, and iteration is repeated until an iteration requirement is satisfied; and reverse pre-processing is carried out, and blocked ciphertext images are combined into a ciphertext image.

Description

Digital image encryption and decryption method based on cellular automaton and chaotic mapping
Technical Field
The invention relates to the field of digital image processing, in particular to a digital image encryption and decryption method based on cellular automata and chaotic mapping.
Background
The digital image represents information by visual effect, the data volume is large, the correlation between pixels is high, the requirement of real-time encryption is high, and the classic cryptography method cannot well meet the requirement. Therefore, the technology for digital image encryption attracts a wide attention of scholars and is gradually becoming an important branch in cryptography.
Digital image encryption is different from traditional data encryption, and mainly has the following characteristics: (1) the digital image represents information by a visual picture, so that the digital image has larger information quantity compared with the text information, and therefore, a long time is needed for encrypting the digital image by using a classical encryption algorithm, and the encryption efficiency is not high. (2) Digital images are stored in a two-dimensional matrix data format, and most algorithms cannot utilize the characteristic to carry out parallelization processing but carry out operations such as preprocessing, rearrangement and the like when the digital images are encrypted, so that the time is greatly increased, and the encryption efficiency is reduced. (3) Unlike information such as text, images allow some degree of distortion in encryption and decryption due to their visual characteristics. (4) The digital image has great correlation between adjacent pixels, and the representation shows that the values of the adjacent pixels are mostly similar or identical, and the correlation must be removed from the encrypted image, which means that the encryption algorithm has great sensitivity and higher requirements on security.
There are many existing digital image encryption schemes, which can be roughly divided into three directions, namely scrambling and substitution, so as to combine the two directions. Scrambling, also known as pixel scrambling, is performed by scrambling the positions of the pixels of the original image to achieve the purpose of encrypting the image. The main scrambling algorithms include Arnold mapping, Baker mapping, Magic mapping and the like, and derived scrambling algorithms thereof, and in recent years, chaotic systems are gradually becoming the trend of scrambling technology. Replacement means that the pixel value itself is replaced and changed. The image pixel values are replaced so that the histogram of the whole image is uniformly distributed and the correlation among pixels is reduced as much as possible. The replacement of pixels by the evolution of cellular automata has become a trend in recent years.
At present, because the scrambling operation of each time is very simple, the traditional scrambling algorithms such as Arnold mapping, Baker mapping, Magic mapping and the like can achieve ideal scrambling effect after a plurality of scrambling operations; secondly, as the scrambling operation does not change the value of each pixel, the statistical characteristics of the pixels are not changed, which brings great potential safety hazard; the scheme of encrypting the digital image by using chaotic mapping has the advantages that most of keys are short, and the scheme has great potential safety hazard when violent cracking is faced; in addition, the chaos mapping is singly used as an encryption means, the relative confusion degree is not high enough, and the chaos mapping is easy to break when a plaintext attack is selected; the scheme of digital image encryption by using the cellular automata has the advantages of high requirement on most iteration times, more encryption rounds, low encryption efficiency and incapability of meeting the real-time property.
Disclosure of Invention
The invention provides a digital image encryption method based on a cellular automaton and chaotic mapping, which has good encryption effect and better chaotic characteristic.
Still another object of the present invention is to provide a decryption method of the digital image encryption method based on the cellular automata and the chaotic map.
In order to achieve the technical effects, the technical scheme of the invention is as follows:
a digital image encryption method based on cellular automata and chaotic mapping comprises the following steps:
s1: generating a key to generate a coefficient, iteration times and an evolution rule of a cellular automaton of the 3D chaotic mapping;
s2: preprocessing an image to be encrypted;
s3: pixel position scrambling is carried out on the pixels of the preprocessed image by using the coefficient of the 3D chaotic mapping obtained in the S1;
s4: and (4) carrying out iterative encryption on the plaintext block of the image after the pixel scrambling by using the cellular automata evolution rule obtained in the S1, repeating iteration until the iteration requirement is met, and finally carrying out reverse preprocessing to obtain the ciphertext image.
Further, the specific process of step S1 is as follows:
selecting a 288-bit binary bit stream as a key to generate the coefficients of the 3D chaotic mapping, the iteration times and the rule numbers of the evolution rules of the cellular automata, wherein the key generation algorithm is that the first 7 × 32 bits represent an integer for each 32 bits, and the integers are respectively used as six coefficients of the 3D chaotic mapping (a)xayazbxbybz) And the iteration number t, and the last 64 bits form the rule number r of the cellular automaton.
Further, the specific process of step S2 is as follows:
the pixels of the gray-scale image to be encrypted, which are plain text, are rendered three-dimensional, with the length and height of the image M being W and H, respectively, and the decomposition can be performed according to the following equation:
W × H = 2 N 1 3 + 2 N 2 3 + ... + 2 N k 3 + R - - - ( 1 )
wherein,representing two pixel cubes of equal size, each of length NkR ∈ (0,1,2, …, 15) is a tail item that cannot be decomposed and is ignored in the subsequent encryption process.
Further, the specific process of step S3 is as follows:
s31: establishing a 3D chaotic mapping function:
2) the conventional Arnold transform is transformed by introducing two parameters a and b:
x i + 1 y i + 1 = 1 1 1 2 x i y i ( mod p ) - - - ( 3 )
expanding to equation (4):
x i + 1 y i + 1 = 1 a b a b + 1 x i y i ( mod p ) - - - ( 4 )
2) keeping z unchanged, and performing two-dimensional Arnold transformation on the formula (4) in an x-y plane to obtain a formula (5):
x i + 1 y i + 1 z i + 1 = 1 a z 0 b z a z b z + 1 0 0 0 1 x i y i z i ( mod 1 ) - - - ( 5 )
3) keeping x unchanged, and performing two-dimensional Arnold transformation on the formula (4) in a y-z plane to obtain a formula (6):
x i + 1 y i + 1 z i + 1 = 1 0 0 0 1 a x 0 b x a x b x + 1 x i y i z i ( mod 1 ) - - - ( 6 )
4) keeping y unchanged, and performing two-dimensional Arnold transformation on the formula (4) in an x-z plane to obtain a formula (7):
x i + 1 y i + 1 z i + 1 = 1 0 a y 0 1 0 b y 0 a y b y + 1 x i y i z i ( mod 1 ) - - - ( 7 )
5) multiplying the coefficient matrixes in the formulas (5), (6) and (7) to obtain a 3D chaotic mapping formula (8):
x i + 1 y i + 1 z i + 1 = A x i y i z i ( mod p ) - - - ( 8 )
wherein,
A = 1 + a x a z a y a z a y + a x a z + a x a y a z b x b z + a x b y + a x a z b y b z a z b z + 1 a y a z + a x a y a z b y b z + a x a z b z + a x a y b y + a x a x b x b y + b y b x a x a y b x b y + a x b x + a y b y + 1 ,
axayazbxbybzall are positive integers, N is the length of the cube, i ∈ [0, N-1]X, y and z are coordinates of a pixel in a three-dimensional space respectively;
s32: and performing position scrambling processing on the pixels by using the obtained 3D chaotic mapping function:
firstly, carrying out 3D chaotic mapping on Q once by using a formula (2) to obtain Q1Then Q is1And Q' is exclusive-OR (XOR) at each position to obtain QThen to Q'1Performing 3D chaotic mapping to obtain Q'2And finally Q1And Q'2Performing an exclusive OR (XOR) operation to obtain Q2I.e. byWhere Q and Q' characterize a pair of pixel cubes of equal volume for the image.
Further, the specific process of step S4 is as follows:
handle Q2And Q'2Expanding into two-dimensional plane according to position, and respectively using the two-dimensional plane as two initial states C of 2D second-order cellular automata evolution0And C1Calculating C0And C1The Hash value is used as an initial value and a parameter of piecewise linear chaotic mapping so as to generate a random boundary of the cellular automaton, and a global evolution function is obtained according to a rule number rG is Ct+1=G(Ct,Ct-1) And carrying out two evolutions on the two initial states by using the same to obtain C2And C3Mixing C with2And C3Reconstructing a pixel cube, taking the cube as a primary encryption iteration, judging whether the iteration number reaches t times, if so, reversely constructing an encrypted image according to a formula (1): otherwise, go to step S3 to perform the next iteration until the number of times is satisfied.
A decryption method of a digital image encryption method based on a cellular automaton and chaotic mapping comprises the following steps:
s61: generating parameters of 3D chaotic mapping and rule numbers of a 2D second-order cellular automaton by using the 288-bit binary stream key which is the same as that in the encryption stage in the same way;
s62: preprocessing the image to be decrypted in the same way as the encryption stage;
s63: performing reverse iteration of the cellular automaton on the pixel blocks, and setting two initial states of the cellular automaton formed by the ciphertext image blocks as C2And C3Respectively calculating the Hash values of the two, thereby generating a random boundary of the cellular automata, and obtaining a reverse global evolution function G' according to a rule number r because an inverse rule of the second-order cellular automata is the random boundary of the second-order cellular automata, so that Ct-1=G′(Ct,Ct+1) After two evolutions, C is obtained1And C0
S64: establishing an inverse mapping function of the 3D chaotic mapping:
x i y i z i = A - 1 x i + 1 y i + 1 z i + 1 ( mod N )
wherein A is-1Is the inverse matrix of A, N is the length of the cube, i ∈ [0, N-1]X, y and z are coordinates of a pixel in a three-dimensional space respectively, and the pixel blocks obtained by decryption in S63 are subjected to cross exclusive OR (XOR) operation and inverse operation of 3D chaotic mapping respectively;
s65: and (3) circularly executing the steps S63 and S64 until the iteration number t defined in the key is met, thereby completing the whole decryption process, and finally reconstructing the plaintext image according to the inverse operation of the formula (1) and completing the decryption.
Compared with the prior art, the technical scheme of the invention has the beneficial effects that:
compared with the traditional chaotic mapping, the 3D chaotic mapping adopted by the invention has better chaotic characteristics and can achieve the scrambling effect more quickly; the method is different from a cycle boundary or a mirror image boundary adopted by the traditional cellular automata, and provides a random generation boundary, so that the evolution of the cellular automata has chaotic characteristics, and the known plaintext attack and the selected plaintext attack can be resisted; 3D chaotic mapping and a cellular automaton are combined in a cross encryption iteration mode, so that the key space reaches 288 bits, brute force cracking attack can be effectively resisted, and the encryption effect is better; based on the idea of block encryption, the chaotic mapping and the evolution of the cellular automata can be parallel, so that the scheme has the capability of parallel processing; the method meets the requirement of security, is a lossless and non-expansive image encryption scheme, ensures the universality of the method in image encryption, and can be conveniently transplanted to the encryption of compressed images.
Drawings
FIG. 1 is a flow chart of an encryption method of the present invention;
FIG. 2 is a three-dimensional exploded view of a two-dimensional image during encryption in accordance with the present invention;
FIG. 3 is a diagram of the evolution stage of the cellular automata during the encryption process of the present invention;
FIG. 4 is a flow chart of the decryption method of the present invention;
FIG. 5 is a diagram of the reverse evolution stage of the cellular automata during the decryption process of the present invention.
Detailed Description
The drawings are for illustrative purposes only and are not to be construed as limiting the patent;
for the purpose of better illustrating the embodiments, certain features of the drawings may be omitted, enlarged or reduced, and do not represent the size of an actual product;
it will be understood by those skilled in the art that certain well-known structures in the drawings and descriptions thereof may be omitted.
The technical solution of the present invention is further described below with reference to the accompanying drawings and examples.
Example 1
As shown in fig. 1, a digital image encryption method based on cellular automata and chaotic mapping includes the following basic processes:
(1) a key generation phase;
(2) an image preprocessing stage;
(3) a pixel position scrambling stage;
(4) an evolution stage of the cellular automata;
(5) and (4) judging the iteration frequency condition according to the step (4) and outputting a result.
The following steps (1) to (5) are described in detail:
the step (1) comprises the following steps:
a key generation stage, selecting a binary bit stream with the length of 288 bits as a key to generate the coefficients and the iteration times of the 3D chaotic mapping and the rule number of the evolution rule of the cellular automata, wherein the key generation algorithm is that the first 7 × 32 bits represent an integer every 32 bits and are respectively used as six coefficients of the 3D chaotic mapping (a)xayazbxbybz) And the iteration number t, and the last 64 bits form the rule number r of the cellular automaton.
The step (2) comprises the following steps:
the image pre-processing stage, the pixels of the grey-scale image as plain text are rendered three-dimensional (for a color RGB image it is possible to process each channel separately). Assuming that the length and height of the image M are W and H, respectively, the decomposition can be performed according to equation (1):
W × H = 2 N 1 3 + 2 N 2 3 + ... + 2 N k 3 + R - - - ( 1 )
wherein,representing two pixel cubes of equal size, each of length NkR ∈ (0,1,2, …, 15) is a tail item that cannot be decomposed and is ignored in the subsequent encryption process, as shown in FIG. 2.
The step (3) comprises the following steps:
and a pixel position scrambling stage. Introducing a 3D chaotic mapping function according to the rule of the step (3-1), and discretizing the pixel position according to a formula (2) aiming at the pixel position which is a discretized positive integer:
x i + 1 y i + 1 z i + 1 = A x i y i z i ( mod N ) - - - ( 2 )
wherein N is the length of the cube, i belongs to [0, N-1], and x, y and z are the coordinates of a pixel in a three-dimensional space respectively.
Taking a pair of pixel cubes with equal volumes as an example, let Q and Q', firstly, Q is subjected to one-time 3D chaotic mapping by using a formula (2) to obtain Q1Then Q is1And Q' is exclusive-OR (XOR) at each position to obtain QThen to Q'1Performing 3D chaotic mapping to obtain Q'2And finally Q1And Q'2Performing an exclusive OR (XOR) operation to obtain Q2I.e. by
The step (3-1) comprises the following steps:
(3-1-1) conventional Arnold is transformed by introducing two parameters a and b:
x i + 1 y i + 1 = 1 1 1 2 x i y i ( mod p ) - - - ( 3 )
expanding to equation (4):
x i + 1 y i + 1 = 1 a b a b + 1 x i y i ( mod p ) - - - ( 4 )
(3-1-2) performing two-dimensional Arnold transformation on the formula (4) in an x-y plane while keeping z constant to obtain a formula (5):
x i + 1 y i + 1 z i + 1 = 1 a z 0 b z a z b z + 1 0 0 0 1 x i y i z i ( mod 1 ) - - - ( 5 )
(3-1-3) keeping x unchanged, and performing two-dimensional Arnold transformation on the formula (4) in a y-z plane to obtain a formula (6):
x i + 1 y i + 1 z i + 1 = 1 0 0 0 1 a x 0 b x a x b x + 1 x i y i z i ( mod 1 ) - - - ( 6 )
(3-1-4) performing two-dimensional Arnold transformation on the formula (4) in the x-z plane while keeping y constant to obtain a formula (7):
x i + 1 y i + 1 z i + 1 = 1 0 a y 0 1 0 b y 0 a y b y + 1 x i y i z i ( mod 1 ) - - - ( 7 )
(3-1-5) multiplying the coefficient matrixes in the formulas (5), (6) and (7) to obtain a 3D chaotic mapping formula (8):
x i + 1 y i + 1 z i + 1 = A x i y i z i ( mod p ) - - - ( 8 )
wherein,
A = 1 + a x a z a y a z a y + a x a z + a x a y a z b x b z + a x b y + a x a z b y b z a z b z + 1 a y a z + a x a y a z b y b z + a x a z b z + a x a y b y + a x a x b x b y + b y b x a x a y b x b y + a x b x + a y b y + 1 ,
axayazbxbybzall positive integers.
Matrix a causes the mapping to produce a chaotic effect.
The step (4) comprises the following steps:
and (5) an evolution stage of the cellular automata. Handle Q2And Q'2Expanding into two-dimensional plane according to position, and respectively using the two-dimensional plane as two initial states C of 2D second-order cellular automata evolution0And C1. According to the rule of step (4-1), C is calculated0And C1The Hash value is further used as an initial value and a parameter of the piecewise linear chaotic mapping, so that a random boundary of the cellular automaton is generated. Finally, obtaining a global evolution function G according to the rule number r to enable Ct+1=G(Ct,Ct-1) And carrying out two evolutions on the two initial states by using the same to obtain C2And C3. As shown in fig. 3.
The step (4-1) comprises the following steps:
(4-1-1) setting a two-dimensional cellular automaton with the size of M multiplied by N as C;
(4-1-2) Hash-evaluating C using a 32-bit MD5(Message-Digest Algorithm 5) Algorithm as a Hash function, the value being expressed in 16;
(4-1-3) respectively using 1-16 bits and 17-32 bits of the value to form an initial value x and a parameter p, and obtaining the values of x and p;
(4-1-4) introducing a piecewise linear chaotic mapping definition:
f ( x ) = x / p x ∈ [ 0 , p ) ( x - p ) / ( 0.5 - p ) x ∈ [ p , 0.5 ) f ( 1 - x , p ) x ∈ [ 0.5 , 1 ) - - - ( 9 )
wherein, the formula (9) is a three-segment linear chaotic system, x belongs to [0,1], p belongs to [0,0.5] is a control parameter of the system;
(4-1-5) operating 2 × (M + N) +4 times using equation (9) to generate random sequences required for all border cells;
(4-1-6) binarizing the sequence results to fill up the supplemented boundary cells in clockwise order from the top left corner of the cellular automaton.
The step (5) comprises the following steps:
and (4) reconstructing the result of the step (4) into a pixel cube, taking the pixel cube as an encryption iteration, and judging whether the iteration number reaches t times. If the iteration number is satisfied, reversely constructing the encrypted image according to the formula (1): otherwise, turning to the step (3), and carrying out the next iteration until the number of times is met.
Example 2
As shown in fig. 4, a basic flow of a confidential method of a digital image encryption method based on a cellular automaton and chaotic mapping is as follows:
(1) a key generation phase;
(2) an image preprocessing stage;
(3) a pixel reverse iteration stage;
(4) a chaotic mapping inverse operation stage;
(5) and (5) circularly executing the steps (3) and (4), judging the iteration frequency condition and outputting the result.
The following steps (1) to (5) are described in detail:
the step (1) comprises the following steps:
a key generation phase. And generating parameters of the 3D chaotic mapping and a rule number of the 2D second-order cellular automata by using the 288-bit binary stream key which is the same as the key in the encryption stage in the same way as in the encryption stage.
The step (2) comprises the following steps:
and (5) an image preprocessing stage. The image is preprocessed in the same way as in the encryption phase, the ciphertext image is blocked, using equation (1):
W × H = 2 N 1 3 + 2 N 2 3 + ... + 2 N k 3 + R - - - ( 1 )
wherein,representing two pixel cubes of equal size, each of length NkR ∈ (0,1,2, …, 15) is a tail item that cannot be decomposed and is ignored in the subsequent decryption process.
The step (3) comprises the following steps:
and a reverse evolution stage of the cellular automaton. In contrast to the encryption process, the reverse iteration of the cellular automaton is performed on the pixel blocks, and the two initial states of the cellular automaton formed by the ciphertext image blocks are respectively set as C2And C3And respectively calculating the Hash values of the two, thereby generating the random boundary of the cellular automaton. Since the inverse rule of the second-order cellular automaton is itself, the reverse global evolution function G' can be obtained according to the rule number r, so that Ct-1=G′(Ct,Ct+1) After two evolutions, C is obtained1And C0As shown in fig. 5.
The step (4) comprises the following steps:
3D chaotic map defined according to equation (2):
x i + 1 y i + 1 z i + 1 = A x i y i z i ( mod N ) - - - ( 2 )
wherein N is the length of the cube, i belongs to [0, N-1], and x, y and z are the coordinates of a pixel in a three-dimensional space respectively.
For the inverse operation, the inverse matrix A of the matrix A needs to be calculated-1Since det (a) is 1, the inverse matrix is obtainable, 3The inverse mapping definition of the D chaotic map is described by equation (3):
x i y i z i = A - 1 x i + 1 y i + 1 z i + 1 ( mod N ) - - - ( 2 )
wherein N is the length of the cube, and i belongs to [0, N-1 ].
And (4) respectively and alternately performing exclusive OR (XOR) operation and inverse operation of 3D chaotic mapping (opposite to the encryption process) on the pixel blocks obtained by decryption in the step (3).
The step (5) comprises the following steps:
and (4) circularly executing the steps (3) and (4) until the iteration times t defined in the secret key are met, thereby completing the whole decryption process, and finally reconstructing a plaintext image according to the inverse operation of the formula (1) and completing the decryption.
The same or similar reference numerals correspond to the same or similar parts;
the positional relationships depicted in the drawings are for illustrative purposes only and are not to be construed as limiting the present patent;
it should be understood that the above-described embodiments of the present invention are merely examples for clearly illustrating the present invention, and are not intended to limit the embodiments of the present invention. Other variations and modifications will be apparent to persons skilled in the art in light of the above description. And are neither required nor exhaustive of all embodiments. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention should be included in the protection scope of the claims of the present invention.

Claims (6)

1. A digital image encryption method based on cellular automata and chaotic mapping is characterized by comprising the following steps:
s1: generating a key to generate a coefficient, iteration times and an evolution rule of a cellular automaton of the 3D chaotic mapping;
s2: preprocessing an image to be encrypted;
s3: pixel position scrambling is carried out on the pixels of the preprocessed image by using the coefficient of the 3D chaotic mapping obtained in the S1;
s4: and (4) carrying out iterative encryption on the plaintext block of the image after the pixel scrambling by using the cellular automata evolution rule obtained in the S1, repeating iteration until the iteration requirement is met, and finally carrying out reverse preprocessing to obtain the ciphertext image.
2. The digital image encryption method based on cellular automata and chaotic mapping according to claim 1, wherein the specific process of step S1 is as follows:
selecting a 288-bit binary bit stream as a key to generate the coefficients of the 3D chaotic mapping, the iteration times and the rule numbers of the evolution rules of the cellular automata, wherein the key generation algorithm is that the first 7 × 32 bits represent an integer for each 32 bits, and the integers are respectively used as six coefficients of the 3D chaotic mapping (a)xayazbxbybz) And the iteration number t, and the last 64 bits form the rule number r of the cellular automaton.
3. The digital image encryption method based on cellular automata and chaotic map according to claim 2, wherein the specific process of step S2 is as follows:
the pixels of the gray-scale image to be encrypted, which are plain text, are rendered three-dimensional, with the length and height of the image M being W and H, respectively, and the decomposition can be performed according to the following equation:
W × H = 2 N 1 3 + 2 N 2 3 + ... + 2 N k 3 + R - - - ( 1 )
wherein,representing two pixel cubes of equal size, each of length NkR ∈ (0,1,2, …, 15) is a tail item that cannot be decomposed and is ignored in the subsequent encryption process.
4. The digital image encryption method based on cellular automata and chaotic map according to claim 3, wherein the specific process of step S3 is as follows:
s31: establishing a 3D chaotic mapping function:
1) the conventional Arnold transform is transformed by introducing two parameters a and b:
x i + 1 y i + 1 = 1 1 1 2 x i y i ( mod p ) - - - ( 3 )
expanding to equation (4):
x i + 1 y i + 1 = 1 a b a b + 1 x i y i ( mod p ) - - - ( 4 )
2) keeping z unchanged, and performing two-dimensional Arnold transformation on the formula (4) in an x-y plane to obtain a formula (5):
x i + 1 y i + 1 z i + 1 = 1 a z 0 b z a z b z + 1 0 0 0 1 x i y i z i ( mod 1 ) - - - ( 5 )
3) keeping x unchanged, and performing two-dimensional Arnold transformation on the formula (4) in a y-z plane to obtain a formula (6):
x i + 1 y i + 1 z i + 1 = 1 0 0 0 1 a x 0 b x a x b x + 1 x i y i z i ( mod 1 ) - - - ( 6 )
4) keeping y unchanged, and performing two-dimensional Arnold transformation on the formula (4) in an x-z plane to obtain a formula (7):
x i + 1 y i + 1 z i + 1 = 1 0 a y 0 1 0 b y 0 a y b y + 1 x i y i z i ( mod 1 ) - - - ( 7 )
5) multiplying the coefficient matrixes in the formulas (5), (6) and (7) to obtain a 3D chaotic mapping formula (8):
x i + 1 y i + 1 z i + 1 = A x i y i z i ( mod p ) - - - ( 8 )
wherein,
A = 1 + a x a z a y a z a y + a x a z + a x a y a z b x b z + a x b y + a x a z b y b z a z b z + 1 a y a z + a x a y a z b y b z + a x a z b z + a x a y b y + a x a x b x b y + b y b x a x a y b x b y + a x b x + a y b y + 1 ,
axayazbxbybzall are positive integers, N is the length of the cube, i ∈ [0, N-1]X, y and z are coordinates of a pixel in a three-dimensional space respectively;
s32: and performing position scrambling processing on the pixels by using the obtained 3D chaotic mapping function:
firstly, carrying out 3D chaotic mapping on Q once by using a formula (2) to obtain Q1Then Q is1And Q' is exclusive-OR (XOR) at each position to obtain QThen to Q'1Performing 3D chaotic mapping to obtain Q'2And finally Q1And Q'2Performing an exclusive OR (XOR) operation to obtain Q2I.e. byWhere Q and Q' characterize a pair of pixel cubes of equal volume for the image.
5. The digital image encryption method based on cellular automata and chaotic map according to claim 4, wherein the specific process of step S4 is as follows:
handle Q2And Q'2Expanding into two-dimensional plane according to position, and respectively using the two-dimensional plane as two initial states C of 2D second-order cellular automata evolution0And C1Calculating C0And C1The Hash value is used as an initial value and a parameter of piecewise linear chaotic mapping so as to generate a random boundary of the cellular automaton, and a global evolution function G is obtained according to a rule number r so that C is obtainedt+1=G(Ct,Ct-1) And carrying out two evolutions on the two initial states by using the same to obtain C2And C3Mixing C with2And C3Reconstructing a pixel cube, taking the cube as a primary encryption iteration, judging whether the iteration number reaches t times, if so, reversely constructing an encrypted image according to a formula (1): otherwise, go to step S3 to perform the next iteration until the number of times is satisfied.
6. A decryption method for the digital image encryption method based on cellular automata and chaotic mapping according to claim 5, comprising the steps of:
s61: generating parameters of 3D chaotic mapping and rule numbers of a 2D second-order cellular automaton by using the 288-bit binary stream key which is the same as that in the encryption stage in the same way;
s62: preprocessing the image to be decrypted in the same way as the encryption stage;
s63: performing reverse iteration of the cellular automaton on the pixel blocks, and setting two initial states of the cellular automaton formed by the ciphertext image blocks as C2And C3Respectively calculating the Hash values of the two, thereby generating a random boundary of the cellular automata, and obtaining a reverse global evolution function G' according to a rule number r because an inverse rule of the second-order cellular automata is the random boundary of the second-order cellular automata, so that Ct-1=G′(Ct,Ct+1) After two evolutions, C is obtained1And C0
S64: establishing an inverse mapping function of the 3D chaotic mapping:
x i y i z i = A - 1 x i + 1 y i + 1 z i + 1 ( mod N )
wherein A is-1Is the inverse matrix of A, N is the length of the cube, i ∈ [0, N-1]X, y and z are coordinates of a pixel in a three-dimensional space respectively, and the pixel blocks obtained by decryption in S63 are subjected to cross exclusive OR (XOR) operation and inverse operation of 3D chaotic mapping respectively;
s65: and (3) circularly executing the steps S63 and S64 until the iteration number t defined in the key is met, thereby completing the whole decryption process, and finally reconstructing the plaintext image according to the inverse operation of the formula (1) and completing the decryption.
CN201610848141.8A 2016-09-23 2016-09-23 Cellular automata and chaotic mapping-based digital image encryption method and decryption method thereof Pending CN106373082A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610848141.8A CN106373082A (en) 2016-09-23 2016-09-23 Cellular automata and chaotic mapping-based digital image encryption method and decryption method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610848141.8A CN106373082A (en) 2016-09-23 2016-09-23 Cellular automata and chaotic mapping-based digital image encryption method and decryption method thereof

Publications (1)

Publication Number Publication Date
CN106373082A true CN106373082A (en) 2017-02-01

Family

ID=57898010

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610848141.8A Pending CN106373082A (en) 2016-09-23 2016-09-23 Cellular automata and chaotic mapping-based digital image encryption method and decryption method thereof

Country Status (1)

Country Link
CN (1) CN106373082A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107590843A (en) * 2017-09-07 2018-01-16 电子科技大学 The image encryption method of two-dimentional reversible cellular automata based on construction
CN107886463A (en) * 2017-10-12 2018-04-06 东北大学 A kind of digital image encryption method based on Chen systems and cellular automaton
CN108898024A (en) * 2018-06-04 2018-11-27 河南师范大学 A kind of decryption method of the encrypted image based on hyperchaotic system and automated cell machine
CN115065762A (en) * 2022-06-13 2022-09-16 四川大学 3D image encryption method based on computational ghost imaging

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002252610A (en) * 2001-02-22 2002-09-06 C4 Technology Inc Encryption device and decryption device, and public key encryption system and public key decryption system
CN102034217A (en) * 2010-11-22 2011-04-27 天津职业技术师范大学 Authenticity self-identifying and tampering self-positioning method for digital image
CN102904710A (en) * 2012-10-11 2013-01-30 长春理工大学 Hyper-chaos encryption method for weak password based on quantum cellular neural network
CN104751401A (en) * 2015-04-16 2015-07-01 大连大学 Novel piecewise linear chaotic mapping image encrypting and encoding method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002252610A (en) * 2001-02-22 2002-09-06 C4 Technology Inc Encryption device and decryption device, and public key encryption system and public key decryption system
CN102034217A (en) * 2010-11-22 2011-04-27 天津职业技术师范大学 Authenticity self-identifying and tampering self-positioning method for digital image
CN102904710A (en) * 2012-10-11 2013-01-30 长春理工大学 Hyper-chaos encryption method for weak password based on quantum cellular neural network
CN104751401A (en) * 2015-04-16 2015-07-01 大连大学 Novel piecewise linear chaotic mapping image encrypting and encoding method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ATIEH BAKHSHANDEH等: "An authenticated image encryption scheme based on chaotic maps and memory cellular automata", 《OPTICS AND LASERS IN ENGINEERING》 *
李静医等: "基于3D混沌映射和细胞自动机的图像加密方案", 《计算机科学》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107590843A (en) * 2017-09-07 2018-01-16 电子科技大学 The image encryption method of two-dimentional reversible cellular automata based on construction
CN107590843B (en) * 2017-09-07 2019-08-13 电子科技大学 The image encryption method of the reversible cellular automata of two dimension based on construction
CN107886463A (en) * 2017-10-12 2018-04-06 东北大学 A kind of digital image encryption method based on Chen systems and cellular automaton
CN107886463B (en) * 2017-10-12 2020-03-24 东北大学 Digital image encryption method based on Chen system and cellular automaton
CN108898024A (en) * 2018-06-04 2018-11-27 河南师范大学 A kind of decryption method of the encrypted image based on hyperchaotic system and automated cell machine
CN108898024B (en) * 2018-06-04 2021-05-04 河南师范大学 Encrypted image decryption method based on hyperchaotic system and automatic cell machine
CN115065762A (en) * 2022-06-13 2022-09-16 四川大学 3D image encryption method based on computational ghost imaging
CN115065762B (en) * 2022-06-13 2023-10-10 四川大学 3D image encryption method based on computing ghost imaging

Similar Documents

Publication Publication Date Title
Ghadirli et al. An overview of encryption algorithms in color images
Chen et al. A symmetric image encryption scheme based on 3D chaotic cat maps
CN105681622B (en) A kind of color image encrypting method based on cell neural network hyperchaos and DNA sequence dna
CN107220923B (en) Digital picture feedback encryption method based on image network
CN107094072B (en) Mixed chaotic encryption method based on generalized Henon mapping
Liu et al. A double perturbation method for reducing dynamical degradation of the digital baker map
Rathod et al. Design and implementation of image encryption algorithm by using block based symmetric transformation algorithm (hyper image encryption algorithm)
CN106373082A (en) Cellular automata and chaotic mapping-based digital image encryption method and decryption method thereof
CN107330338B (en) Color image encryption and decryption method and system based on double-chaos cross diffusion
CN110120079A (en) Based on three-dimensional Logistic mapping and broad sense Cat mapping color image encryption method
CN111031191B (en) Image encryption method based on controlled alternate quantum walking and DNA sequence operation
CN106407824A (en) Image encryption method and device
CN110572252A (en) image encryption and decryption method based on fractional order translation chaotic system
Wang et al. Chaotic image encryption algorithm based on dynamic spiral scrambling transform and deoxyribonucleic acid encoding operation
CN115580687A (en) Multi-image encryption method based on variable parameter hyperchaotic system and S-shaped diffusion
CN109586895B (en) Novel color image encryption method
Kechaidou et al. Game of life variations for image scrambling
CN110838908B (en) Image encryption and decryption method based on GF matrix transformation and random hierarchical fusion
Alhassan et al. Enhancing image security during transmission using residue number system and k-shuffle
CN116996626A (en) Double-quantum image encryption method based on chaotic system
CN110879894A (en) Image encryption and decryption method based on lazy scale transformation and random layered fusion
Tabash et al. Image encryption algorithm based on chaotic map
Brindha Periodicity analysis of Arnold Cat Map and its application to image encryption
CN113344762B (en) Double scrambling image encryption method based on AFD adaptive decomposition
Hashemi Design a new image encryption using fuzzy integral permutation with coupled chaotic maps

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170201

RJ01 Rejection of invention patent application after publication